{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T01:14:13Z","timestamp":1725671653365},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1109\/iscit.2014.7011935","type":"proceedings-article","created":{"date-parts":[[2015,1,21]],"date-time":"2015-01-21T19:36:49Z","timestamp":1421869009000},"page":"373-377","source":"Crossref","is-referenced-by-count":10,"title":["Securing wireless medical implants using an ECG-based secret data sharing scheme"],"prefix":"10.1109","author":[{"given":"Guanglou","family":"Zheng","sequence":"first","affiliation":[]},{"given":"Gengfa","family":"Fang","sequence":"additional","affiliation":[]},{"given":"Mehmet A.","family":"Orgun","sequence":"additional","affiliation":[]},{"given":"Rajan","family":"Shankaran","sequence":"additional","affiliation":[]},{"given":"Eryk","family":"Dutkiewicz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653712"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/ICPPW.2003.1240399"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934987"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935179"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.237"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2009.5183475"},{"key":"11","first-page":"150","article-title":"Hijacking an insulin pump: Security attacks and defens es for a diabetes therapy system","author":"li","year":"2011","journal-title":"The 12th IEEE International Conference on e-Health Networking Applications and Services Healthcom"},{"journal-title":"Medtronic Company Website","year":"0","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753462"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MMM.2010.938579"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/EMB.2008.915488"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2002.1023680"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228364"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018438"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.31"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0040200"},{"key":"9","article-title":"Absence makes the heart grow fonder: New directions for implantable medical device security","author":"tamara denning","year":"2008","journal-title":"Proceedings of the 3rd Conference on Hot Topics in Security (HOTSEC' 08"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2008.16"}],"event":{"name":"2014 14th International Symposium on Communications and Information Technologies (ISCIT)","start":{"date-parts":[[2014,9,24]]},"location":"Incheon, South Korea","end":{"date-parts":[[2014,9,26]]}},"container-title":["2014 14th International Symposium on Communications and Information Technologies (ISCIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7000610\/7011852\/07011935.pdf?arnumber=7011935","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T01:29:56Z","timestamp":1490318996000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7011935\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/iscit.2014.7011935","relation":{},"subject":[],"published":{"date-parts":[[2014,9]]}}}